Share this article

Aave DAO Votes to Integrate Chainlink Proof of Reserves to Tighten Network Security

Although the decentralized lending protocol’s data is inherently on-chain, introducing Chainlink’s PoR would help mitigate the risk of attacks on the Aave protocol.

Updated Dec 23, 2022, 4:04 p.m. Published Dec 22, 2022, 7:03 p.m.
Aave is Finnish for "ghost." (MidJourney/CoinDesk)
Aave is Finnish for "ghost." (MidJourney/CoinDesk)

Decentralized lending protocol Aave will implement a “proof of reserve” system to protect bridged assets on Avalanche, a decentralized finance (DeFi) twist on the centralized exchanges racing to shore up customer confidence in the wake of FTX.

The decentralized autonomous organization (DAO) behind Aave, the popular DeFi protocol on Ethereum, approved blockchain oracle Chainlink’s Proof of Reserve smart contract by a vote of over 99% in favor. It will specifically cover Aave versions (v)2 and v3 on the Avalanche blockchain.

STORY CONTINUES BELOW
Huwag palampasin ang isa pang kuwento.Mag-subscribe sa The Protocol Newsletter ngayon. Tingnan lahat ng newsletter

Bridged assets are DeFi’s way of moving value between blockchains that don’t normally communicate with each other. The asset gets locked in a smart contract on its home chain; then, a clone is issued on the target network. Aave v3 on Avalanche has bridged versions of DAI, USDT and USDC, among other tokens.

But this setup creates many security vulnerabilities, and hackers have repeatedly exploited token bridges. This year, Web3 game Axie Infinity’s Ronin network and cross-chain protocol Nomad faced exploits totaling over $800 million due to breaches on their token-bridges.

Bored Ghost Developing, the Web3 studio behind the proposal, says its PoR smart contracts will give an extra layer of security to Aave’s Avalanche implementation, but can also help mitigate attacks on bridged assets on the network.

“The focus is more on automatically detecting and acting whenever any symptom of security issues on a bridge appears,” said Ernesto Boado, the former chief technology officer at Aave and co-founder at Bored Ghost Developing, which wrote the proposal. “We think that obviously, transparency goes first, in this case, our development goes a step further.”

Under the proposal Aave will use ChainLink PoR’s aggregator smart contract to protect tokens on the original network (Ethereum) as well as their bridged versions on the target network (Avalanche).

Max Melcher, go-to-market lead of proof of reserve at Chainlink Labs, told CoinDesk that proof of reserves allow decentralized technologies to accurately report on reserve values, rather than trusting a single party to do so.

“Leveraging Chainlink Proof of Reserve, Aave can verify that bridged assets accepted on the platform are fully collateralized before allowing users to borrow against them,” said Melcher.

Proof of reserves have recently been in the news post-collapse of FTX because the industry is demanding more transparency from centralized exchanges (CEX). Earlier this month, popular exchange Crypto.com’s reserve ratios show that investors’ assets are safely backed. Last week, Binance’s auditor Mazars cut ties with the exchange, raising questions about the exchange’s reserves, or lack thereof.

Higit pang Para sa Iyo

Microsoft Raises Alarm of Malware Targeting Coinbase, MetaMask Wallets

Microsoft shareholders voted against adding bitcoin to its company's treasury. (Photo by Craig T Fruchtman/Getty Images)

A new report from Microsoft researchers warned of malware that could steal and decrypt users’ information from 20 of some of the most popular cryptocurrency wallets.

Ano ang dapat malaman:

  • Tech giant Microsoft shared a new report warning of malware that targets 20 of the most popular cryptocurrency wallets used with the Google Chrome extension.
  • The malware, dubbed StilachiRAT, could deploy “sophisticated techniques to evade detection, persist in the target environment, and exfiltrate sensitive data."
  • While the malware has not been distributed widely, Microsoft did share that it has not been able to identify what entity is behind the threat.